Authentication (sec-auth)

Monitors failed login attempts, root/administrator logins, and SSH configuration. Detects brute-force attacks and insecure SSH settings.

Configuration

ParameterTypeDefaultDescription
enabledbooltrueEnable/disable module
failed_login_thresholdint5Threshold for failed logins per IP
failed_login_window_minutesint15Time window for login counting (minutes)
alert_on_root_loginbooltrueAlert on root/admin login
root_login_allowed_ipslist[]IPs from which root login is allowed
audit_ssh_configbooltrueCheck SSH configuration (Linux only)
ssh_config_pathstring/etc/ssh/sshd_configPath to sshd_config
expected_permit_root_loginstringnoExpected PermitRootLogin value
expected_password_authstringnoExpected PasswordAuthentication value
log_pathslist[]Additional auth log paths
use_journalctlbool/nullnullForce journalctl (true) or auto-detect (null)

YAML Example

sec_auth:
  enabled: true
  failed_login_threshold: 10
  failed_login_window_minutes: 30
  alert_on_root_login: true
  root_login_allowed_ips:
    - "10.0.0.1"
  audit_ssh_config: true
  expected_permit_root_login: "no"
  expected_password_auth: "no"

Diagnostic Codes

CodeSeverityMeaningRecommendation
40000No authentication issues detected
40011–2Many failed logins from a single IPInvestigate IP, consider blocking (fail2ban)
40021–2Root/admin login from external IP detectedRestrict access, use SSH keys
40031Failed sudo attempts or account changesInvestigate affected accounts
40901Auth logs not readableCheck permissions, test journalctl
60011SSH allows root loginSet PermitRootLogin no in sshd_config
60021SSH allows password authenticationSet PasswordAuthentication no, use SSH keys

Platform Support

  • Linux: Reads /var/log/auth.log or journalctl -u ssh. SSH configuration auditing.
  • Windows: Evaluates the Security Event Log (Event IDs 4625, 4624, etc.).